21st Century Learning and Teaching
586.1K views | +15 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'TAO'. Clear
Scooped by Gust MEES
Scoop.it!

There's no way of knowing if the NSA's spyware is on your hard drive

There's no way of knowing if the NSA's spyware is on your hard drive | 21st Century Learning and Teaching | Scoop.it
Russian security software maker Kaspersky Lab published a report all but accusing the NSA of hiding spyware on hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers. And there’s no way to know if it’s on there.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Equation-Group


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Russian security software maker Kaspersky Lab published a report all but accusing the NSA of hiding spyware on hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers. And there’s no way to know if it’s on there.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Equation-Group


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

The Digital Arms Race: NSA Preps America for Future Battle - SPIEGEL ONLINE | CyberWar | CyberSecurity

The Digital Arms Race: NSA Preps America for Future Battle - SPIEGEL ONLINE | CyberWar | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No.

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No. | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
No comment yet.
Rescooped by Gust MEES from Digital Delights - Digital Tribes
Scoop.it!

The New Tao of Leadership - John Maeda

The New Tao of Leadership - John Maeda | 21st Century Learning and Teaching | Scoop.it

What's the Significance?

 

For Maeda, learning to be a creative leader has been a process of experimentation within these two roles, leading to a balance that enables him to be tough and also to be nurturing, depending on what the moment and the audience demands.

 

Gust MEES:

 

One needs to find the balance between authority and being too friendly, but every time being adaptable to any situations, a problem solver! This can ONLY be achieved when having the right knowledge, Life-Long-Learning! Knowledge in different Topics, that takes years to acquire, but worth to learn it...

 

Key words: empathy, Life Long Learning, communication, engagement, motivation, authority, own pace learning, self-directed learning, psychology, analyzing, synthese...

 


Via Ana Cristina Pratas
No comment yet.
Scooped by Gust MEES
Scoop.it!

Destroying your hard drive is the only way to stop this super-advanced malware

Destroying your hard drive is the only way to stop this super-advanced malware | 21st Century Learning and Teaching | Scoop.it

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole?

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | 21st Century Learning and Teaching | Scoop.it
The Heartbleed bug is unusually worrisome because it could possibly be used by the NSA or other spy agencies to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — as well as the private keys that vulnerable web sites use to encrypt your traffic to them.


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.

Gust MEES's insight:


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.


So might hear in a couple of months more then, probably!


Gust MEES's curator insight, April 10, 2014 11:03 AM


Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.


So might hear in a couple of months more then, probably!



Learn more:



Scooped by Gust MEES
Scoop.it!

Spy agencies are slurping personal data from leaky mobile apps

Spy agencies are slurping personal data from leaky mobile apps | 21st Century Learning and Teaching | Scoop.it
Beyond device details, data shared over the internet by iOS and Android apps can include personal information such as age, gender, and location, while some apps share even more sensitive user infor...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ANT

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/